Methods and systems for network-based messaging systems with database management for supporting based inter-user communications, such as via computing devices, are disclosed. The methods and systems facilitate improved message transmission management for more efficient communications. The methods and systems can provide enhanced electronic communications, such as via electronic mail or text messaging. Improved communication tools are provided to better manage and/or control communications. The computing devices can be personal communication/computing devices, such as mobile, portable or handheld computing devices (e.g., smart phone, a laptop, a tablet, etc.).
|
7. A computer-implemented method for processing text messages exchanged between senders and recipients, the computer-implemented method is executed by one or more servers of a messaging service that is accessible to users that are users having user accounts with the messaging service, the computer-implemented method comprising:
processing text messages by a user that acts as a sender to a user that acts as a recipient;
receiving a throttle setting provided by the recipient, the throttle setting being a configuration that is applicable to the sender, the configuration identifying a threshold number of text messages that will be permitted to be sequentially received from the sender to the recipient before a throttle action is applied to the text messages received from the sender for the recipient, wherein the recipient is provided with a user interface control for setting at least one of the throttle settings applicable to messages from the sender;
detecting that the threshold number of text messages sent from the sender to the recipient has been exceeded;
delaying additional text messages sent by the sender to the recipient from being presented to the recipient after the threshold number of text messages has been detected to have been sent by the sender to the recipient; and
presenting, as text messages, the additional text messages sent by the sender to the recipient at a later time after the delaying,
providing a visual indication on a display of a computing device associated with the sender, the visual indication indicating those one or more text messages from the sender that have been delayed from been presented to the recipient, and the visual indication being provided on or adjacent those one or more text messages from the sender while such one or more text messages are being delayed from being presented to the recipient.
1. A cloud system for servicing message exchanges between users that operate as senders and recipients of messages, the cloud system comprising:
a server interfaced with storage, the storage used to store messages being exchanged by the users, the users being provided with access to the cloud system via user accounts managed by the cloud system, the user accounts enabling the users to send and receive messages, the server operates to receive the messages from one or more senders and to cause the messages to be sent to one or more recipients,
the server includes throttle logic that enables the users to configure and apply throttle settings on the one or more senders that send the messages,
for a particular sender of the one or more senders and a particular recipient of the one or more recipients, the throttle settings is a configuration that limits messages that will be presented to the particular recipient from the particular sender, configuration of the throttle settings further acting to provide an automatic notification to the particular sender informing the particular sender that messages sent to the particular recipient have been delayed due to throttling; and
a database operatively accessible by the server, the database being configured to store message management data for the users, the message management data including the throttle settings that are distinct for a plurality of the one or more senders that send messages to the particular recipient,
wherein the particular recipient is provided with a user interface control for controlling invocation of at least one of the throttle settings on messages from the particular sender,
wherein the messages that have been sent to the particular recipient that have been delayed due to throttling are chat or instant text messages,
wherein the messages that have been sent to the particular recipient that have been delayed due to throttling are received, as text messages, by the particular recipient at a later time after the throttling, and
wherein, when throttling is being performed, a visual indication is configured to be presented on a display of a computing device associated with the particular sender, the visual indication indicating those one or more messages from the particular sender that are being delayed from been presented to the particular recipient, and the visual indication being provided on or adjacent to the display of those one or more messages from the particular sender that are being delayed from being presented to the recipient.
2. The cloud system of
3. The cloud system of
server-side logic for interfacing with client-side logic, the client-side logic being associated with an application that is downloadable from a network-based service to a user device, the application including user interfaces for composing messages, reading messages, sending messages and setting throttle settings.
4. The cloud system of
5. The cloud system of
a data center for operating the server, and the data center providing access to the database.
6. The cloud system of
an application programming interface (API) to a server of a social network, the social network identifying friends of a sender or recipient, the API providing a structured form for requesting data and receiving data from the social network.
8. A computer-implemented method as recited in
sending a notification to the sender informing the sender that the additional text messages to the recipient have been delayed due to exceeding the threshold number of text messages.
9. A computer-implemented method as recited in
using a custom message for the notification.
10. A computer-implemented method as recited in
11. A computer-implemented method as recited in
12. A computer-implemented method as recited in
13. A computer-implemented method as recited in
14. A computer-implemented method as recited in
|
This application claims priority benefit of U.S. Provisional Patent Application No. 62/099,105, entitled “COMPUTER BASED USER COMMUNICATION,” and filed on Dec. 31, 2014, and which is hereby incorporated herein by reference.
This application also claims priority benefit of U.S. Provisional Patent Application No. 62/115,309, entitled “MESSAGE COMMUNICATION SYSTEMS AND APPLICATIONS WITH MESSAGE LIFETIME SETTINGS FOR AUTOMATIC MESSAGE DELETION,” and filed on Feb. 12, 2015, and which is hereby incorporated herein by reference.
Today, it is popular for people to text message or chat amongst one another. Text messages can be sent by various means, such as Short Message Service (SMS) or dedicated application programs (e.g., instant messaging applications). Examples of dedicated application programs include Whatsapp, Snapchat, Google Talk, ChatOn, and Facebook Messenger. Also, it is popular for people to also communicate by electronic mail (email), phone or video calls, using mobile telephones or computers. Mobile telephones enable communication by electronic mail, text messages or voice calls. One example of a VoIP-based phone application is Skype.
As communication options keep expanding, users will necessarily be required to manage multiple accounts for receiving communications. In some cases, users are forced to manage multiple accounts to keep personal and business communications separate. Although expanding the communications options for users is a benefit in terms of expanding the user's communication reach, users are currently challenged to keep up with the volume and intensity of received messages. This challenge is in part due to the vast amounts of social and work related demands on a user's time.
There remains a need for improved approaches to enable users to more efficiently manage communications, such as responses to communication requests, between one or more communication modes.
The invention pertains to methods and systems for network-based messaging systems with database management for supporting based inter-user communications, such as via computing devices. The methods and systems facilitate improved message transmission management for more efficient communications. The methods and systems can provide enhanced electronic communications, such as via electronic mail or text messaging. Improved communication tools are provided to better manage and/or control communications. The computing devices can be personal communication/computing devices, such as mobile, portable or handheld computing devices (e.g., smart phone, a laptop, a tablet, etc.).
The invention may be implemented in numerous ways, including, but not limited to, as a method, system, device, or apparatus (including computer program code). Several embodiments of the invention are discussed below.
As a cloud system for servicing message exchanges between users that operate as senders and recipients of messages, one embodiment of the cloud system can, for example, include a server interfaced with storage, and a database operatively accessible by the server. The storage can be used to store messages being exchanged by the users. The users can be provided with access to the cloud system via user accounts managed by the cloud system. The user accounts can enable the users to send and receive messages. The server can operate to receive messages from one or more senders and to cause messages to be sent to one or more recipients. The server can include throttle logic that enables users to configure and apply throttle settings on the one or more senders that send messages. A throttle setting is a configuration that limits messages that will be presented to the recipient from the sender. Also, configuration of throttle settings can act to provide an automatic notification to a sender informing the sender that messages sent to the recipient have been delayed due to throttling of the messages. The database can be configured to store message management data for users, and the message management data can include the throttle settings.
As a computer-implemented method for processing text messages exchanged between senders and recipients, one embodiment can be executed by one or more servers of a messaging service that is accessible to users that are users having user accounts with the messaging service. In one embodiment, the computer-implemented method can, for example, include at least: processing text messages by a user that acts as a sender to a user that acts as a recipient; receiving a throttle setting from the recipient, the throttle setting being a configuration that identifies the sender, the configuration identifying a threshold number of text messages that will be sequentially received from the sender to the recipient before a throttle action is applied to the text messages received from the sender for the recipient; detecting that the threshold number of text messages sent from the sender to the recipient has been exceeded; and stopping additional text messages sent by the sender to the recipient from being presented to the recipient after the threshold number of text messages has been detected to have been sent by the sender to the recipient.
In one embodiment, the computer-implemented method can also include sending a notification to the sender informing the sender that the additional text messages to the recipient have been stopped due to exceeding the threshold number of text messages.
In one embodiment, the computer-implemented method can also include providing a visual indicator on a display of a computing device associated with the sender, the visual indicator indicating those one or more messages from the sender that have been stopped from been presented to the recipient.
In one embodiment, the computer-implemented method can also enable users to access the messaging service via an application accessible by user devices. The application can, for example, include user interfaces for composing text messages, reading text messages, controls for sending text messages, controls for applying the throttle setting, controls for selecting recipients of text messages, and/or controls for viewing a history of messages between one or more senders and recipients.
In one embodiment, the computer-implemented method can also utilize or interact with a server-side application to connected with a client-side application of the messaging service. The client-side application can be a downloadable application that is provided by the messaging service for devices to user the client-side application. The client-side application can include a user interface for applying a throttle setting.
In one embodiment, the computer-implemented method can also utilize or access a database that stores message management information regarding at least throttle settings assigned to users acting as senders to particular recipients.
Other aspects and advantages of the invention will become apparent from the following detailed description taken in conjunction with the accompanying drawings which illustrate, by way of example, the principles of the invention.
The invention will be readily understood by the following detailed description in conjunction with the accompanying drawings, wherein like reference numerals designate like structural elements, and in which:
The invention pertains to methods and systems for network-based messaging systems with database management for supporting based inter-user communications, such as via computing devices. The methods and systems facilitate improved message transmission management for more efficient communications. The methods and systems can provide enhanced electronic communications, such as via electronic mail or text messaging. Improved communication tools are provided to better manage and/or control communications. The computing devices can be personal communication/computing devices, such as mobile, portable or handheld computing devices (e.g., smart phone, a laptop, a tablet, etc.).
The various aspects, features, embodiments or implementations of the invention described herein can be used alone or in various combinations.
Embodiments of various aspects of the invention are discussed below with reference to figures. However, those skilled in the art will readily appreciate that the detailed description given herein with respect to these figures is for explanatory purposes as the invention extends beyond these limited embodiments.
One aspect of one or more embodiments of the invention pertains to a throttling action that can control communications.
A throttle serves as a way to limit or compact communications with respect to one or more users. The communications can, for example, be text messages, e-mail messages, or telephone calls. The throttle can limit communications in any of a variety of different ways. For example, one type of throttle can impose a limit on the number of messages per unit time. Another type of throttle can impose a size limit on messages. Another type of throttle can restrict or prevent content types, such as preventing videos or pictures, for a given sender or type of sender. For example, a throttle might completely prevent video and/or pictures from a sender, or might prevent video and/or pictures for a period of time (e.g., 1 hour), or might limit the quantity or size of pictures and/or video (e.g., 2 multimedia assets per 15 minutes; max size 1 MB). Another type of throttle can impose limitations dependent upon the time of day or location of recipient and/or sender of messages. Another type of throttle can be dependent on status of either sender or recipient. Still another type of throttle can be based on the social connection status of the sender with respect to the recipient (e.g., friends, important friend, less important friend, a friend of a friend, etc.). Further, types of throttles can be set by a user, e.g., such as by selecting an action to take with respect to a sender of a message, and/or setting rules for actions to take with respect to messages received from a particular sender or senders. In some embodiments, the rules can process or depend on one or more conditions that can direct when particular actions to impose throttle actions are to be applied. The conditions can be temporal (e.g., different actions for different times of day and/or days of the week), or based on a number of messages received, or based on the context of the message itself (e.g., urgency expressed by the sender in the message data), or based on relationship status of the sender to the receiving user, or combinations thereof. In one embodiment, throttle(s) that implement the rules and process the conditions can be set by the user via a user interface provided by a communications application. The processing of logic to implement the conditions can be executed by a processor of the device executing the application and rendering the user interface, or can be executed by one or more servers that provide cloud processing for communications applications, or by hybrid processing that includes processing operations on the device of the user and also processing operations on a server, e.g., via an application (app) having access to the Internet. Any of these different types of throttles can be used separately or in any combinations.
As one example, in the case of a recipient user and the sender user both being at their workplace, while sending messages, the communication applications being utilized by the sender and recipient can impose a throttle such that the sender and recipient users (which might modify their behavior) are managed to limit communications while at work (though such restrictions could be relaxed if, on break or lunch).
One example of a throttle is a limit type throttle in which the number of messages in a given amount of time is limited. For example, a limit type throttle might impose a limit of one text message per every five (5) minutes. The sender attempting to send a message, in violation of the limit type throttle, could be provided with a notification. The notification can notify the sender that the text message they are attempting to send is in violation of the limit type throttle and thus will not be sent or will be sent after the imposed throttle expires or is removed. That is, the limit type throttle can be configured to “bounce” or “defer sending” of a message being throttled. In another example, the throttle may act to generate a notification to the sender, indicating that the message was received, but will not be presented to the recipient until a later point in time. For instance, if a sender sends more than two (2) text messages within a period time, e.g., 5 minutes, and the recipient does not reply to either text message, the throttle can notify the sender that any additional messages will be collected and queued, and not shown or presented to the recipient until a period time passes, e.g., 15 minutes, 30 minutes, an hour, two hours, or some user configurable period to time. In this manner, if the sender deemed too active in sending messages to the recipient, a throttle can be imposed on the sender. The recipient, who knows this user is too active, can customized a throttle for that sender. This throttle can act to automatically send the sender a message, e.g., text, pre-recorded voice call or message, or text, noting that their first two messages were received, and their subsequent messages within a predetermined period of time, e.g., hour, will be queued and not presented to the recipient during that predetermined period of time. This throttle therefore acts to proactively encourage the active message sender to stop sending messages during the next hour or send less messages in the future, as they know they will be limited to two text messages. As noted above, throttle times and number of messages can be customized for different users.
In another embodiment, a method can be processed to examine a history of messages received from a user's contacts, which will enable the system to generate throttles or recommended throttles for the examined user contacts. In this examination, users that send frequent texts messages, frequent phone calls, etc., can be identified, and based on their historical contact patterns, the system can implement or recommend throttles for each user. In one embodiment, the system can group users into categories, e.g., based on their historical messaging activity and based on their relationship to the user and/or based on their social status or importance. For instance, if an active messaging sender is the wife of the recipient, the recommended throttle may be relaxed to allow more messages to come in and be delivered to the recipient. If the active messaging sender is an advertiser or commercial entity, those messages may be throttled more aggressively. If the active messaging sender is work partner, the system may recommend a medium level throttle.
In still other embodiments, a throttle may be moderated based on the content of the message, e.g., such as by reading the text message and identifying context (or converting voicemails to text to identify context). Generally speaking, context may define what the message relates to by analyzing key words and/or strings of words. In some cases, context may be determined by analyzing multiple messages over period of time, e.g., to determine if a conversation is ongoing. In other embodiments, the determined context may automatically suggest to the user to change the throttle of the message or groups of messages, e.g., while a conversation is ongoing or the conversation relates to a topic that may be important or of relative importance to the recipient user.
In still other embodiments, a throttle being imposed can be overridden. For example, use of a code word or expression of urgency might wholly or partially override a throttle.
As another example, a throttle can be a time of day type throttle in which messages are limited or blocked/prevented based on the time of day at which a message is attempted to be sent. One attempting to send a message in violation of the time of day type throttle can be provided with the notification that the message is not permitted to be sent or will be deferred until sending is permitted.
In one embodiment, a time of day can be compared to a calendar of the recipient. If the calendar indicates that the recipient is currently in a meeting, is on vacation, is working out, is traveling, etc., the system may use this information to customize a notification response to a throttle. In some embodiments, to some senders, the system will provide more detail obtained from the calendar, e.g., the type of meeting the user is currently tied up in and/or the people with which the recipient is meeting with, and/or other contextual information. For instance, if the sender is the sender's wife, the details can be more detailed and/or informative based on calendar data. If the sender is just an acquaintance or a person not currently in the recipient's contact list, the response notification can be more generic. In addition or alternatively to a calendar, in one embodiment, the recipient status can be predicted such as by location, by social media postings (e.g., check-in”), and the like.
In one embodiment, a throttle can be imposed, and/or elevated to increased throttling in a “vacation mode.” A recipient status can thus be denoted (e.g., manually by a user or automatically with reference to a calendar) as “on vacation” or the like, and such can trigger activation of a throttle or enhancing a throttle already imposed.
In some embodiments, in addition to or alternative to examining a calendar of the user, other digital sources of the user can be accessed. These digital sources can include the user's contact list, the use's online contacts, the user's friends lists from social networks, data obtained from a social network (e.g., such as the frequency of contact/messaging with the sender of the message, number of friends in common, context of communications or postings between the sender and recipient, number of “likes” posted to each other's social stream, etc.), data obtained from public or private databases, data obtained from a place of work (e.g., based on privilege access), and data generated from combining data from one or more of these digital sources. For instance, inferences can be made or validated by comparing the user's relationship as expressed in these difference digital sources. For example, the recipient's contact data may not have information that the sender is the recipient's wife, but from information obtained from a social network or posts and/or comments, it can deduced with a greater certainty score that the sender is indeed the recipient's wife. In some cases, the system may generate an inquiry message to the recipient asking “Bill, Is Jane your wife?” Still further, if the sender is identified to be a marketer (e.g., using caller ID, or by analyzing the content of the messages or both), the response can be more strict and to the point. This information, as noted above, can then be used to determine or suggest or recommend a throttle to apply to particular senders.
For purposes of one example, a notification response could display a message to the sender's device or play a recorded audio (e.g., in the recipient's voice or computer generated). One example notification message to the sender can be, without limitation: “Bill you have sent too many message recently, so your last message won't be delivered for 5 minutes.” Another example notification message is “It's too late, so your messages are restricted.” Still another example notification is “I'm working, so you messages will be delayed until after work.”
In some embodiments, notification content can be customized by a user ahead of time. In other embodiments, notification content can be selected from a predefined list of notifications, which may insert the recipient's name (e.g., Bill), so as to appear custom. In other embodiments, recommended notifications can be suggested to the recipient, for use in regard to a given sender. For instance, if a sender sends several messages, and the recipient has not yet assigned a throttle to the sender, the system can suggest particular types of one or more throttles and/or options of responses for the sender. In other embodiments, the recipient can choose to send a response message to the sender based on availability in the recipient's calendar or other digital source. In still other embodiments, the response message can be automatically selected based on one or more determining factors, e.g., the time of day, day of the week, number of messages received, messages received over a period of time, content in the messages, context of message as determined from the message itself, importance of the sender, relationship of the sender to the recipient, and combinations thereof.
In some implementations, the user may provide a weighting as to which of the determining factors are more important. In some cases, the user may wish the calendar availability to take priority over the number of messages. In other cases, the recipient can set the system to allow unlimited messages when the calendar shows the recipient is available, but when the user is busy (e.g., booked for a meeting), the throttle can be applied. These options can be set by the user via a user interface on a communications application, or can be set periodically during use or interaction with incoming messages.
In some cases, the application and/or server can provide to the recipient suggestions on types of throttles to apply to certain senders. For instance, the system can suggest one or more custom replies. Once the throttle is set, if the throttle deems that a message will not be sent, an appropriate notification message is generated and communicated to the sender. As noted above, this processing avoids excess disturbances to the recipient. Additionally, this processing can be by a server, which can implement the throttling, can operate to avoid processing messages and sending communications that are not going to be read or are not desired by the recipient to be read, or would not be well received for one reason or another.
It is further noted that by not sending messages, or queuing messages for future sending as a group reduces computation by servers and devices. This reduction in computation can have the added technical effect of saving power at a server and/or data center resources, e.g., energy utilized to run a data center, air conditioning systems for the data center, storage, and the like.
Another example of a throttle is a content type throttle that can limit certain type or size of content. One type of content type throttle is a “no pictures” throttle. Another type of content type throttle is a “no audio” throttle. Still another type of content type throttle is a “no video” throttle. As an example of size of content, the size can be determined based on one or more multiple communications. For example, if the sender sends a series of messages, and the combined size of the content exceeds a threshold, the content type throttle can be applied. Another throttle can be to limit duration of audio or video content of messages.
Another example of a throttle is a workplace throttle. The work place throttle can operate to prevent, limit or defer communications, such as messaging, while a sender and/or recipient are at work. The determination of whether a user is at work can be based on a location of the user or can be based on a normal work schedule or based on a user setting that they are at work. One example method for identifying location of the sender and/or the recipient may be by examining the global positioning system (GPS) data of one or both devices involved in the communication. If the device is not a wireless device, Internet Protocol (IP) addresses associated with machines sending or receiving messages may be examined. In other embodiments, the content of the communications can examined to identify conversation data that identifies a place and/or location.
Another example of a throttle is a driving throttle. The driving throttle can operate automatically to prevent or defer communications while the sender or recipient are considered in a motor vehicle or, more particularly, driving a motor vehicle. Various techniques and/or devices can be used to determine when the driving throttle should be imposed, such as an accelerometer, location detector, etc.
A graphical user interface can be utilized to assist the user in setting or resetting a throttle. A throttle can be implemented to be applicable to all incoming messages or applicable to only incoming messages from certain users. The throttle can be set to be generally applicable, or can be set in accordance with a preference setting and thereafter utilized. These preference settings can be turned on and off and/or overwritten with other user selections, if desired. Additionally or alternatively, in the context of a messaging user interface, such as chat or text, messaging interface, user controls can be provided to enable a recipient user to easily impose a throttle on a specific sender user.
As mentioned above, the types of throttles can also be suggested to a recipient, based on the identify of a sender. As used herein, a throttle broadly defines what action to take in regard to a message or communication. The action taken includes, for example, whether to send and/or deliver a message to a recipient when originating from a particular sender and a particular time, or based on some limit on communications, or combinations of factors discussed in more detail above. The action taken can also be viewed to include a notification provided to the sender, e.g., notifying the sender of the action that will be taken in regard to their sent message or messages. As seen from the recipient, once a throttle is in place and active, there will be cases where messages are not received until some later point in time, and when received, maybe a group of messages are delivered at the same time. In some case, the recipient may never receive a message, if the sender is blocked and notified or just blocked. In some cases, some messages are received, e.g., one or more, and then subsequent ones are held or blocked. If a message is blocked, the sender can be prevented from entering or sending another message, or if permitted to enter and send a message, the message can be held in a sender queue and then later sent (after throttle expiries or ends), optionally, the sender could then be queried as to whether the message should still be sent at that time.
Further, setting the preferences can be dynamic, e.g., via the message stream or message listing. For instance, if the user is viewing messages in an inbox, an action tag can be applied (e.g., displayed) next to the message or messages to define the throttle to be applied (or available to be applied) for the sender. Further, the types of throttles to apply for particular senders can be customized, e.g., by the user or by the system based on the analysis described above.
Accordingly, setting a throttle based on a preference setting can be computer-implemented such that if the conditions associated with the preference setting are met, then the corresponding throttle can be automatically imposed. For example, a user deemed to be driving can have the driving throttle imposed on their communications. As another example, if a sender user has sent “too many” messages in a short amount of time, then a throttle can be automatically imposed. For example, the preference setting might be a limit (e.g., threshold) of (i) 2 messages in 5 minutes, (ii) more than two messages, or (iii) collective messages exceed x-bytes, etc. As another example, for a workplace throttle, the throttle can impose a limit of 5 messages per hour during working hours, unless on break.
The throttle process 200 can begin with a decision 202 that determines whether a message has been received. In one implementation, the message, if received, is from another user that has initiated the message using a remote computing device that is able to communicate over one more networks to the computing device operating the throttle process 200. In another implementation, the message, if received, is from a user of the computing device.
When the decision 202 determines that a message has not been received, the throttle process 200 can await the receipt of an incoming message. On the other hand, when the decision 202 determines that a message has been received, a decision 206 can determine whether an active throttle exists for the user associated with the incoming chat message. When the decision 206 determines that there is an active throttle for the user associated with the incoming message, a responsive action can be determined 208 based on the active throttle. Here, the throttle process 200 can support one or more responsive actions to an active throttle. In addition, there can be one or more different types of available active throttles that can be activated or implemented for a particular user. After the responsive action has been determined 208, the responsive action can be implemented 210. There are various different responsive actions that can be implemented 210 to provide the throttling being imposed on the messages associated with the particular user. Following the block 210, the throttle process 200 can end. In addition, when the decision 206 determines that an active throttle is not presently associated with the user of the incoming message, the throttle process 200 can end.
The throttle process 200 is, for example, implemented on a computing device associated with the recipient of an incoming chat message. However, in an alternative or complementary embodiment, a throttle process (same or similar to the throttle process 200) could be implemented on a computing device associated with a sender of a message. In such case, an active throttle could have a responsive action that prevents, defers, alters or delays sending of an outgoing message. Further, in another alternative or complementary embodiment, a throttle process (same or similar to the throttle process 200) could be implemented on a computing device of a central server system, which can be remote from a computing device used by sender or receiver.
The throttle process 200 generally refers to messages. However, it should be understood that more generally the throttle process 200 can be implemented for electronic messages, such as email, chat, voicemail, VoIP, etc. The throttle process 200 is particularly well suited for text (e.g., chat) messages.
The throttle activation process 300 can begin with a decision 302 that determines whether a throttle is to be activated. When the decision 302 determines that a throttle is not to be activated, the throttle activation process 300 awaits the need to activate a throttle. On the other hand, when the decision 302 determines that a throttle is to be activated, throttle options can be presented 304. For example, the throttle options that are available to be activated can be presented 304 to a user of the computing device, such as by displaying the throttle options on a display screen of the computing device. As mentioned above, the throttle options can be recommendations by the system, or can be provided from the user's custom throttles, or hybrid throttles that include messages/notifications that are user crafted or user modified.
In some embodiments, the throttles options can be implemented in response to voice commands. For instance, if the user listens to a voicemail, at the end of the voicemail the user can say “Apply throttle,” and the system can provide voice read options for the user to select and apply. Accordingly, it should be understood that any input of data, selection, setting, preference, and interaction can be via voice, or combinations of voice and/or user input (e.g., text, selection boxes, touch screen inputs, gestures, etc.).
Next, a decision 306 can determine whether a throttle option has been selected. When the decision 306 determines that a throttle option has been selected, a user identifier can be obtained 308. The user identifier being obtained 308 is the user identifier that is associated with a user for which the throttle option is to be imposed. That is, the throttle to be activated is a throttle that is to be placed on the user identified by the user identifier. Thereafter, the selected throttle option can be associated 310 with the user identifier. For example, the selected throttle option can be stored in a database 511 (e.g., see
Furthermore, the user identifier may be stored in a database that is separate from a database that defines the throttle to be applied or options of throttles that can be applied. In some embodiments, one or more servers can be implemented to provide the association between the user identifier and the throttle to be applied or throttles recommended (e.g., based on actions of the sender and parameters, conditions, settings or rules set by the recipient). In some embodiments, the selected throttle set for a sender having the user identifier can be processed and applied locally at the user's device. For example, the message may be received by the recipient's device, but is hidden to the recipient until the throttle logic determines that presentation (e.g., surfacing) should occur.
In such configurations, some processing can be performed on one or more remote servers connected to the Internet and some of the processing is performed locally by the device of the recipient, e.g., for implementing the throttle actions. As noted, these processes may include, for example, to determine user identifiers, identify throttles to apply, suggest throttles, modify throttles, takes the actions of the throttles, send notifications to the sender notifying of the applied throttle, save a history of applied actions based on set throttles, etc. Still further, in some configurations, throttles set for particular senders can be recommended for other senders that have similar sending or interaction profiles, e.g., number of messages, frequency of messages, length of messages, time of day sent, and/or type of content expressed in the messages. Following the block 310, the throttle activation process 300 can end.
On the other hand, when the decision 306 determines that a throttle option has not been selected, a decision 312 can determine whether the throttle activation process 300 is to be exited. If the decision 312 determines that the throttle activation process 300 is not to be exited, the throttle activation process 300 returns to repeat the decision 306 and subsequent blocks. However, if the decision 312 determines that the throttle activation process 300 is to be exited, then the throttle activation process 300 can end.
Another aspect of one or more embodiments of the invention pertains to summarizing of user communications. The summarizing can serve to condense or replace prior user communications. The summarizing can serve to provide more efficient communications when prior user communications are not able to be read in real-time, or are sent during a blocking period as set by a throttle.
It should be understood that the summarizing features are also applicable to voicemail messages, not just original text-type messages. In the case of voicemail messages, the messages can be converted to text, and if several messages repeat the same content, a new voicemail can be created which summarizes the pertinent content. Optionally, if the user wishes to listen to the original messages, an option can be provided to allow navigation to listen to such messages.
The summary message process 400 can begin with a decision 402 that determines whether a text message has been received. When the decision 402 determines that a text message has not yet been received, the summary message process 400 can await receipt of a text message. Once the decision 402 determines that a text message has been received, a decision 404 can determine whether the text message has been timely read. That is, even though a text message has been received by the computing device, the user may not interact with the computing device until sometime later to actually view the text message. In some cases, the user (recipient) might never actually view the text message. When the decision 404 determines that the text message has been timely read, then the summary message process 400 can promptly end without needing to provide a summary message (at least, as to that text message).
On the other hand, when the decision 404 determines that the text message has not been timely read, a counter of unread text messages for a particular sender user can be increased 406. The counter serves as an indication of the degree to which unread text messages from the particular sender user have been received but have not been read by the recipient user. A decision 408 can then determine whether the count (provided by the counter) is greater than a threshold. The threshold is typically a predetermined threshold that identifies a number beyond which a summary message is deemed appropriate. When the decision 408 determines that the count is not greater than the threshold, then the text message can be presented 410 to the recipient. In this case, the number of unread text messages for the particular sender user has not exceeded the threshold, and, as a result, a summary message is not provided, but the text message is made available to the recipient, typically in a normal fashion. Following the block 410, the summary message process 400 can end without having produced a summary message as to at least a text message.
Alternatively, when the decision 408 determines that the count does exceed the threshold, then additional processing can be performed to produce a summary message for the recipient. In particular, the additional processing can include a decision 412 that determines whether a summary feature is enabled. Here, in one embodiment, the computing device receiving the text message can be configured to enable or disable the summary feature. When the summary feature is enabled, a summary message can be produced and made available to the recipient at appropriate times. When the feature is active, the an option can be provided to allow the user access to the original messages if desired. This may be useful in case the summary does not include certain details that are still needed. In some cases, if the original messages are not accessed for a pre-determined period of time (e.g., 3 months), the original messages may be erased and removed from storage.
Still further, in one embodiment, the summary function can automatically be set based on throttle processing. For instance, if the sender has sent seven (7) short text messages over a period of 2 minutes, the throttle may prevent sending the text messages one at a time. Instead, the seven (7) short text messages are compacted into one text message. In this example, the processing may also automatically reply to the sender asking that text messages be limited or be written in a more concise. By providing the notification messages to the sender of the preferences of the recipient, it is more likely that the recipient will reply timely, and/or will not be annoyed. Furthermore, the time at which the summarized message is delivered to the recipient may be based on the throttle applied to the sender by the recipient.
As several examples of summarizing messages, see the following three texts: (a) “hey, U there?” (b) “?” (c) “dude, pls reply.” Here, a logic or reasoning engine can piece together the words and attempt to make contextual sense of each text individually, and collectively in order. From (a), the system may determine that the sender is asking if the recipient is available. From (b) the system may determine that the sender is repeating a question. From (c) the system may determine that the sender wants a reply. Contextually analyzing (a)-(c) can yield a summary of “If you are available, I need your reply.” In still other embodiments, the summarizing may simply combine the three text messages into one, like: “hey, U there??, dude, pls reply” In yet another embodiment, the summarizing may blend the three messages and add data known to the system, such as user names, such as: “Hey Bill, Are you available? Please reply.” In other implementations, the methods of summarizing may be hybrids of those described above.
When the summary feature is not enabled, summary messages are not presented and thus the messages are simply made available to the user in a normal fashion. In one implementation, when the summary feature is enabled, then any pending unread messages from the particular sender user can be compacted 414 into a summary message. Then, the summary message can be presented 416 to the recipient. The recipient may, at that time, review the summary message or the user may review the summary message at a later point in time. Following the block 416, the summary message process 400 can end. Additionally, when the decision 412 determines that the summary feature is not enabled (i.e., when disabled), the summary message process 400 can also end without having produced a summary message.
A summary message can be generated or produced in any of a number of different ways.
One way a summary message can be generated is by automatic processing in which a set of prior unread messages from a given sender user can be compacted. For example, like messages can be compressed through elimination of substantially similar messages. As another example, messages with little or no meaningful comment can be eliminated.
Another way a summary message can be generated is by further communication with the sender user. As one example, the system can query the sender user to provide a summary, approve a summary, or influence a summary. In one particular example, the system can examine the prior unread messages from a given sender user and generate a proposed summary message, which can then be sent via text messaging, to the sender user for approval. In another particular example, the system can retrieve or retract the prior unread messages from a given sender user and ask the recipient user to return a desired summary message.
Still another way a summary message can be generated is a default message. As one example, the system can replace the prior unread message from a particular sender user with a default message. The default message can state that message(s) were receive but were retracted since not read or responded to. As one example, the default message might state (in place of the prior unread messages) that “Sorry, you missed my x messages send between 5:10 pm and 7:21 pm,” or “Sorry, you missed y messages sent by Bob during your 2 pm meeting.”
In one embodiment, the summarizing function can implement contextual dictionaries, local dialect dictionaries, text slang dictionaries, and reasoning engines to make decisions on possible re-wording or re-statement of phrases.
Another benefit of summarizing messages is reduction of processing power by servers and devices to process inefficient messages that may not be complete thoughts or make sense if sent individually. The reduction in processing can, in some implementations, provide for substantial reductions in power utilization, storage access and transmission, etc. For example, data centers that store messages, process messages and send messages can reduce their processing bandwidth spent on small messages by throttling users that send repeated messages. In the data center, the processing of a message, even when the message is small, requires utilization of storage, processors to access storage, and database accesses so that the messages can be associated with senders and receivers. By throttling and/or summarizing, significant savings in data center processing can be achieved.
The test message management process 450 can determine 452 whether a text message has been received. When the decision 452 determines that a text message has not been received, the test message management process 450 can await receipt of a text message. On the other hand, when the decision 452 determines that a text message has been received, then a decision 454 can determine whether the text message remains unread. Typically, between the decision 452 and the decision 454 other processing or other delay is provided such that, in effect, the recipient has an opportunity to view the received text message if they are available and so desire to view the text message. When the decision 454 determines that the text message has been read, the text message management process 450 can return to repeat the decision 452 so that a subsequent text message can be processed.
On the other hand, when the decision 454 determines that the text message remains unread, additional processing can be performed to determine whether the sender of the text message is to be throttled and/or whether a summary message should instead be presented to the recipient. In this regard, a count of unread text message(s) from a given sender can be increased 456 (e.g., incremented by one). Next, a decision 458 can determine whether the recipient is busy. The determination 458 of whether the recipient is busy can be determined by way of a user input from the recipient and/or from a computer-based estimation of whether the recipient is busy. The computer-based estimation of whether the recipient is busy can be based on the recipient's interaction with the computing device associated with the recipient. When the decision 458 determines that the recipient is not busy, a decision 460 determines whether the count associated with the sender is greater than a threshold. The threshold can be a general threshold or can be a threshold particularly established for the sender or persons in a common category (e.g., friends, family, business associates, etc.). When the decision 460 determines that the count is not greater than the threshold, then the text message management process 450 can return to repeat the decision 452 so that a subsequent text message can be processed. In this regard, since the count does not exceed the threshold, neither a throttle action nor a summary message need be provided, according to this embodiment. Alternatively, when the decision 460 determines that the count is greater than the threshold, then a throttle action and or summary message can be invoked 462 for the given user. Following the block 462, the text message management process 450 can return to repeat the decision 452 so that subsequent text messages can be similarly processed.
In one embodiment, the sender is able to preview a proposed summary message, and then if the sender approves the proposed summary message, the proposed summary message can be used as the summary message. In the same or another embodiment, the sender is able to edit a proposed summary message (e.g., through interaction with the sender's computing device), and then, following the editing, the edited proposed summary message can be used as a summary message. For example, the sender can be assisted to create or edit a summary message (through access to a cloud server and/or through use of the sender's computing device) which allows a summary message to be generated prior to being send to the recipient.
It should be understood that the throttle processing and/or the imposition of a throttle on text messages from a given sender can be achieved by one or more computing devices. In other words, such processing can be performed by client-side computing device associated with the sender, the receiver, some intermediate computing device (whether in the cloud, the Internet, local network or otherwise), or some combination thereof.
In another embodiment, messages exchanged between users can be monitored for lifetime (e.g., message lifetime). For example, a recipient can define a lifetime that defines how long the message will be saved before being deleted. When a message is deleted, the message will be deleted in the local device as well as the sending server, to eliminate a record of the message or conversation. In some embodiments, a throttle can include a condition for lifetime of a message for communication with a recipient. For example, the recipient can tag certain senders as senders for which communications should not be saved and should be deleted from the sender's records and storage, from the communicating network entity (i.e., phone company or communication provider) and from the recipient's devices and records. In one embodiment, the communicating entity can still record usage record without date and time to allow billing, but specific metadata regarding calls made at times, dates and receiving party are removed from storage and history.
To implement a lifetime for a conversation or message, in one embodiment, the recipient can set a lifetime that requests the sender to agree to a lifetime for the message or messages, which causes the sender's devices and communication services to adhere to the setting. At the same time, if the sender agrees to the lifetime, the recipient's device and services will also implement the lifetime. Once this agreement is set between the communicating parties, the parties can communicate using messages that will be expunged from all records after the lifetime expires. The lifetime can be, for instance, within a predetermined time of being received, whether read or not. Alternatively, the lifetime can be, for instance, within a predetermined period of time after being read by the recipient.
In particular embodiments, the lifetime is pre-assigned to particular recipients. If the recipients have previously agreed to the lifetime, i.e., life of message limits, subsequent communications between the users will also adhere to the lifetime. It should be understood that the lifetime can also apply to electronic messages, including voicemail messages, video chats, voice chats, text chats and email communications.
In one embodiment, email communications that adhere to a lifetime can implement an intermediary server that process the email messages between a device of the sender and a device of the recipient. For example, if a lifetime has been assigned for email communications, when an email arrives in an inbox, selection of the email can launch a window or iframe that allows reading of the email as well as composing of a response to the email. The email, in this example, is not actually delivered to the recipient's inbox, but is actually just a link to an online email client that manages the communications between the parties that agreed to the lifetime. In this example, the remotely hosted email client can hold the email, email string, email conversation, etc., for a limited period of time as set by the lifetime.
The limited period of time can be, for example, 30 minutes, 1 hour, 2 hours, 1 day, 2 days, one week, one month, etc. In some examples, either user can decide at any time to delete permanently the email or conversation of emails. In this manner, the emails are not saved in the client or the server. Further, the lifetime can be dynamically set based on identity of the sender of an email or on identity of the recipient of an email.
In further embodiments, depending on sensitivity of content discussed, a lifetime can be automatically applied. For example, if the content of an email appears to use sensitive wording or language, a lifetime can be suggested to both the sender and the recipient to agree on a lifetime. In some embodiments, a business can set rules for applying lifetime, depending the sensitivity of the communications or the persons involved in the communications.
As shown, the client device may have its own email client 524, which may be an application (app). In another embodiment, the email client 524 may be processed entirely on the email server 502. In still other embodiments, the email client 524 provides the user interfaces for allowing the client to use email functions. In the embodiment shown, the throttle service module 526 may be executed on the client device 506. In one embodiment, the throttle service module 526 may just be executed on the email server 502. In one example, the client device 506 may be provide with a thin client for executing the email client 524 and for allowing users to interface with throttle setting controls 516. At the client device 506, the user can decide how to apply throttles to different people that may be communicating with the user. These settings are then communicated to the email server 502, which can associate the settings to the user account 508, throttle settings 512 and threshold settings 514. In one embodiment, the user accounts can be interfaced with a database 511, which may be used to save throttle options of users.
Based on the throttle settings for the sender and/or the message received, a threshold processing module 590 will process the logic associated with determining if the message should be sent to the recipient, denied, queued, or some other action is to be taken. In one example, signal 596 is sent from threshold processing module 590 to the sender processing module 584, indicating that the message should communicated 598 to the throttle message queue 589 for processing. The processing while the message is at the throttle message queue 589 can include deleting, saving a metadata, and/or saving the message to storage 588. At some later point, the message may be sent 599 to the recipient processing module 586 for processing, e.g., such as forwarding to the recipient. The forwarding would be done at a later time, e.g., after a set period of time has lapsed, after a set number of messages are accumulated, etc. In another example, the threshold processing module 590 may send a message to the recipient processing module 586 to simply send the message direction to the recipient without delay, e.g., as not throttle setting was detected or determined to be needed. As noted above, the processing logic executed by the aforementioned modules can be processed in software, in firmware, in program instructions executed with larger systems or subsystems. In some embodiments, the throttle can also act to capture spam with more fidelity, identify senders of the spam, collect spam messages for showing proof of sender, and automatically throttle certain types of messages, e.g., using learning algorithms.
For example, user Bob may be receiving multiple short messages from Steve, and these messages may be accumulating. These messages may be small or cryptic or use slang, which could make them difficult to understand without spending too much time scrolling up to obtain enough context to understand what the message is about.
In one example implementation, the summary feature is configured to remove unnecessary messages, identify context based on two or more of the messages, and construct a summary of the messages. In this simple example, the messages are summarized as “Bob, lunch? Please reply.” If the user wishes to see the full extent of the messages that resulted in the summary, the user can be provided with the option to expand the messages back out.
If the user Bob wishes to throttle Steve, e.g., because he is getting too many messages from Steve, the user can select to throttle Steve's messages. In one configuration, user Bob may custom configure the settings for Steve, e.g., by setting throttle for Steve. In one example, the setting can be to limit the number of messages that can be received from Steve, since the last read message or over a predefined period of time. Any number can be used, but in this example, the setting was set to 2 messages. In another or additional implementation, the user can also set a notification message custom to Steve. For example, the message can be set to “Steve, please reduce the number of messages being sent, I will get back to you soon,” or any other custom or user defined memo. As shown, once the throttle is set to two (2) messages, Bob will only receive two messages from Steve (in real time), and Steve will be notified of the same. This way, if Steve needs to send something important, he will limit his frequency or make more concise text messages, or take some other action.
In one embodiment, the recipient can apply a throttle action to specific voicemails received from certain persons leaving voicemails. For example, the recipient may have already set an action throttle to voicemails received from mom. In indicator may be shown next to the voicemail to show that an active action throttle is present for the voicemails coming from mom or coming from the phone numbers associated from mom.
In one embodiment, logic processing of received voicemails can occur, which enable the system to identify voicemails coming from a frequent voicemail assigned number or person. When this condition is present, the system may apply a recommendation to the voicemail of that frequent assigned number or person. As shown, John Smith appears to be a frequent caller to the recipient and several voicemails have been left by John Smith. The system can apply a recommendation to add a action throttle for voicemails coming from John Smith. The recommendation can be set to occur once the caller has left X number of voicemails within a Y time frame. By way of example, the X number of voicemails can be more than 2 voicemails, 3 voicemails, 4 voicemails, 5 voicemails, 10 voicemails, or any user configurable number. The Y time frame can also be custom set by the user. For example, the Y time frame can be 1 hour, 2 hours, 3 hours, 1 day, 2 days, 1 month, or any other time interval.
If the recipient (i.e., user) decides to set the action throttle for John Smith, that action throttle will be active for the caller, and any future voicemails left by the caller (during the action throttle) will be automatically responded by the system with a message to the caller. The message will notify the caller that messages will not be delivered or read from the caller until a period of time has passed. In another embodiment, the caller can be notified that they have called more than 5 times within the last hour, and the recipient will return their call soon but no more voicemails can be left by the caller. Providing active notification to the caller that no more voicemails will be supported from that caller enables a reduction of voicemails to be processed by the system, which makes it more efficient for the recipient to handle the voicemails and also for the system to provide processing power to other calling persons wishing to leave voicemails.
This embodiment has illustrated an example where voicemails can be throttled by a user, such that frequent callers or callers with an excess number of voicemails can be throttled. Further, notifications can be sent or messages can be played to the frequent caller notifying them that their voicemails are being throttled. The notifications or messages can be customized by the user, such as by leaving customized voicemail responses, text messages, etc. to throttled users. By way of example, if the user decided the throttle voicemails from mom, the user can record a customized recording that will be the message sent back to mom when she exceeds her limit of voicemails and/or is being throttled.
A summary of the voicemails could also be provided. The voicemail summary could be used to replace a plurality of prior voicemails that have not yet been read by the recipient. For example, in the example shown in
In
In
In
As another example, a graphical user interface can display an indication that denotes a remaining duration of throttling of messages. For example, the remaining duration can be displayed to a sender with a notification such as “Throttling Time Remaining: 3 minutes.” The remaining duration can be the duration until a next message can be sent (e.g., next throttled message) or the duration until throttling is turned-off or cleared.
In another embodiment, if a user is throttled, the system can be configured to support an override or emergency message or perhaps a “free pass” message. For example, the sender can be given the ability to provide such an additional message which might be useful in certain situations. In one embodiment, a sender may be able to override a throttle condition. The system can detect an override condition of some sort of. A private word or code is one example of a means to invoke an override condition. If there is any indication of such party conditions, in one embodiment, the recipient can be delivered one or more additional messages and can, if so configured, be alerted by special ring or notice.
In still another embodiment, a recipient can have the ability to change a throttle threshold for the sender in near real time. For example, a graphical user interface can be displayed for the recipient that includes a user interface control that allows the recipient to increase the threshold throttle for the sender. The increased threshold can be then used for the current message session or can become the default threshold for the sender. Also, the sender who has been notified that they have been throttled can in one embodiment be able to request that the recipient increase the threshold throttle being imposed. For example, if the sender has been throttled after having sent five messages that remain unread, the sender can request that the recipient be permitted to send a sixth message that will not be throttled. In this example, the sender is then likely to send a final “to the point” message to the recipient since it is likely their last message for some period of time (at least while the throttle remains imposed).
In another embodiment, a sender may be able to override a throttle condition. The system can detect an override condition of some sort of. A private word or code is one example of a means to invoke an override condition. If there is any indication of such party conditions, in one embodiment, the recipient can be delivered one or more additional messages and can, if so configured, be alerted by special ring or notice.
Notably, in another embodiment, the graphical user interface 1320 does not include any indication that the message display is a summary message. In such case, the recipient does not have any indication that the message displayed in a summary message. For example, the summary symbol 1326 would not be included in the graphical user interface 1320 in such embodiment. This embodiment thus permits a sender of a series of messages to exchange them for a summary message, which facilitates more concise and desired communications, particularly when the original messages were not promptly read (viewed) by recipient.
Various techniques can be used to determine whether a user has read (or viewed) incoming messages. As one example, if the user (i.e., recipient) has the message application open and has interacted with (e.g., scrolled) the graphical user interface, then the messages displayed therein can be considered to have been read. As another example, the recipient's computing device can include an accelerometer and using such data can estimate if following a delivery notification whether the user has likely moved the recipient's computing device to read the message. As another example, if a recipient subsequently sends a reply message it can be assumed that all prior messages that have be previously displayed have been read. However, there can be a delay, so in one implementation a short delay (e.g., 5 seconds) can be used in case the incoming message and a reply “cross” in the network. Then, a message is considered read if was displayed for at least the short delay duration prior to the reply.
If summary message is used, the earlier messages being summarized can also be removed and no longer presentable, or can be available to recipient, sender or both, through a user action (e.g., selection of a user interface control) to request the original corresponding messages. In one embodiment, as messages are received from a sender, a recipient can be provided the opportunity to associate the sender with a tag. The tag can correspond to a category or grouping for senders. Examples of tags include family, friends, work associates, telemarketers, collectors, etc. One advantage of using tags is that upon tagging a sender, the message management with respect to the sender can be configured in accordance with the characteristics established for the tag. As a result, the recipient is able to easily configure settings to be utilized with respect to message management.
In some embodiments, throttle actions can be invoked without specific user input (from a recipient). In other embodiments, a graphical user interface can be presented to enable a user to initiate certain actions. As one example, a graphical user interface control can be presented on the graphical user interface that also presents the messages. One example of a control is a busy control that would enable the recipient to set his condition as “busy.” Another example of a control is a throttle control that would enable a user to manually invoke a throttle action against the sender. Still another example of a control is a tag control that would enable a user to set a tag or a given sender.
The example devices communicating with the network 104 include personal digital assistant devices 1712, tablet computers 1710, display devices 1714, telephone devices 1716, smart phone devices 1718, desktop computers 1720, laptop computers 1722, and other types of computing devices. These devices can be used to generate messages, receive messages, communicate or instruct the messages to be sent to another user, or respond to messages. The throttling mechanisms and summary mechanisms described above can also be set by anyone of the example devices. When a throttle operation is performed or instructed to be performed by one of the devices, the instruction data goes to network 104. The message or data is then propagated to or through one or more communication providers 1702. In addition to the communication providers 1702, various other types of networking equipment, such as routers, hubs, switches, data centers 1780, servers, etc., may interact with the data being sent or received. Logic operations can be performed by custom business logic of the communication providers 1702, depending on a user's service level, they are configuration, applications being run, etc. In some instances, applications that provide for throttling or summary generation may be executed at least in part by servers of one or more of the communication providers 1702. In another embodiment, servers in separate cloud computing environments, e.g., data centers 1780 distributed throughout a geographic area, can be used to apply logic for completing the desired throttling or summary generation. Some of these operations may utilize one or more of the systems in cloud servers, data centers 1780, or infrastructure of the communication providers to communicate with the social networks 1704. The social network 1704 may provide information regarding users social graph, friends lists, recent interactions with friends, identification information regarding friends, identification information regarding users that are not yet friends, identification of related users to senders and recipients of messages, and other metrics. This information can be gathered from time to time by cloud systems that operate or enable the throttling operations and summary operations. The cloud systems, in one embodiment, are executed by servers that may be housed in one or more data centers. In other embodiments, the cloud systems may be housed in enterprise locations or integrated with one or more locations of a communications provider 1702. Depending on the communication or data requested from the social networks 1704 or other data collection systems, APIs may be access so that data can be efficiently requested and received in accordance with a standard protocol or structure.
Additionally, communications systems may also be configured with special purpose circuitry that makes processing of messages more efficient. The special purpose circuitry may include network interface cards that can receive large volumes of messages from a multitude of users, and enable efficient exchange of data between other users that may be part of the same communications provider or other communications provider. In some embodiments, backbone systems are utilized by the communications providers to make efficient transfer of messages, routing of messages, delivery of messages, queuing of messages and saving of messages in a large scale. These systems can be constructed from a multilayered hardware and software components. These components can include proprietary routing and handling algorithms within server systems or data centers and can extend to general data handling once the data is communicated over the network 104.
In one example, the communication providers 1702 may define a public switched telephone network (PSTN). A PSTN is the aggregate of circuit-switched telephone networks that are operated by national, regional, or local telephony operators, providing infrastructure and services for public telecommunication. A PSTN consists of telephone lines, fiber optic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables, all interconnected by switching centers, thus allowing most telephones to communicate with each other. These networks include mobile networks, as well as fixed telephones.
Broadly speaking, mobile phones, e.g., smart phones, send and receive radio signals with any number of cell site base stations having microwave antennas. These cell sites may be connected to a tower, pole or building, located throughout populated areas, then connected to a cabled communication network and switching system. Mobile phones have a low-power transceiver that transmits voice and data to the nearest cell sites, normally not more than 8 to 13 km (approximately 5 to 8 miles) away. These are simply examples systems, infrastructure, hardware, and circuitry that facilitate communication of messages between devices and users. Messages communicated using these devices, hardware, and infrastructure can assist in implementing the throttling or summary functions described herein.
In addition to the devices illustrated in
It should be understood that the various implementations described herein defined technical operations there are more than just processing general operations. These technical operations provide benefits associated with efficient processing power, reduction of power usage caused by excessive messaging, and also lowers the demand on the message handling infrastructure. Furthermore, data exchanged by the various systems can be structured to make efficient communication possible, e.g., by utilization of Application Programming Interfaces (APIs). Structured data reduces processing inefficiencies, and improves the speed at which messages can be communicated, throttling operations can be performed, and summary operations generated, depending on the demands or requests made by specific devices utilizing features described herein.
The various aspects, features, embodiments or implementations of the invention described above can be used alone or in various combinations.
Embodiments of the invention can, for example, be implemented by software, hardware, or a combination of hardware and software. Embodiments of the invention can also be embodied as computer readable code on a computer readable medium. The computer readable medium is any data storage device that can store data which can thereafter be read by a computer system. Examples of the computer readable medium generally include read-only memory and random-access memory. More specific examples of computer readable medium are tangible and include Flash memory, EEPROM memory, memory card, CD-ROM, DVD, hard drive, magnetic tape, and optical data storage device. The computer readable medium can also be distributed over network-coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
Numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will become obvious to those skilled in the art that the invention may be practiced without these specific details. The description and representation herein are the common meanings used by those experienced or skilled in the art to most effectively convey the substance of their work to others skilled in the art. In other instances, well-known methods, procedures, components, and circuitry have not been described in detail to avoid unnecessarily obscuring aspects of the present invention.
In the foregoing description, reference to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Further, the order of blocks in process flowcharts or diagrams representing one or more embodiments of the invention do not inherently indicate any particular order nor imply any limitations in the invention.
The many features and advantages of the invention are apparent from the written description. Further, since numerous modifications and changes will readily occur to those skilled in the art, the invention should not be limited to the exact construction and operation as illustrated and described. Hence, all suitable modifications and equivalents may be resorted to as falling within the scope of the invention.
Thomas, C. Douglass, Penilla, Albert S.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10142274, | Dec 31 2014 | Message communication systems and applications with message lifetime settings for automatic message deletion | |
10291566, | Dec 31 2014 | Data transmission management for computer based inter-user communication | |
5708660, | Mar 03 1995 | Siemens Aktiengesellschaft | Circuit arrangement for accepting and forwarding message cells with an ATM communication equipment |
6052709, | Dec 23 1997 | Symantec Corporation | Apparatus and method for controlling delivery of unsolicited electronic mail |
7552177, | Jul 29 2004 | ACTIVISION PUBLISHING, INC | Method for determining availability of participation in instant messaging |
7603417, | Mar 26 2003 | Meta Platforms, Inc | Identifying and using identities deemed to be known to a user |
7617285, | Sep 29 2005 | CA, INC | Adaptive threshold based spam classification |
7739344, | Jan 20 2006 | International Business Machines Corporation | Instant message method to provide a delayed alarm/reminder |
7774407, | May 09 2006 | ACTIVISION PUBLISHING, INC | Postponing an instant messaging session |
7869794, | Feb 18 2004 | Sprint Spectrum LLC | Method and system for providing timely message delivery |
8296380, | Apr 01 2010 | Kel & Partners LLC | Social media based messaging systems and methods |
8359289, | May 12 1999 | III Holdings 1, LLC | Message processing system |
8385884, | Oct 12 2007 | GOOGLE LLC | Disruption blocking in mobile devices |
8443049, | Aug 20 2004 | Sprint Spectrum LLC | Call processing using trust scores based on messaging patterns of message source |
8577972, | Sep 05 2003 | Meta Platforms, Inc | Methods and systems for capturing and managing instant messages |
8775950, | Sep 29 2005 | Meta Platforms, Inc | Automatic categorization of entries in a contact list |
8972495, | Sep 14 2005 | TAGATOO, INC | Method and apparatus for communication and collaborative information management |
9124645, | Oct 24 2007 | Synchronoss Technologies France | Method and instantaneous messaging system for mobile terminals equipped with a virtual presence server allowing an instantaneous messaging session to be managed automatically |
9209993, | Nov 16 2010 | Microsoft Technology Licensing, LLC | Cooperative session-based filtering |
9626681, | Apr 02 2009 | INTERNATIONAL BUSINESS MACHIINES CORPORATION; International Business Machines Corporation | Negotiable information access in electronic social networks |
20030033467, | |||
20030046421, | |||
20030206619, | |||
20040030753, | |||
20040098423, | |||
20040199592, | |||
20040254998, | |||
20050021832, | |||
20050055410, | |||
20050055416, | |||
20050198173, | |||
20050227678, | |||
20060019639, | |||
20060085528, | |||
20060112166, | |||
20060168017, | |||
20070004385, | |||
20070064899, | |||
20080043941, | |||
20080046532, | |||
20080120704, | |||
20080175174, | |||
20090037539, | |||
20090055489, | |||
20090055491, | |||
20090070210, | |||
20090105377, | |||
20090106365, | |||
20090299934, | |||
20100088180, | |||
20100165980, | |||
20100185741, | |||
20100228582, | |||
20100228830, | |||
20110246584, | |||
20120030293, | |||
20120117161, | |||
20120143972, | |||
20120159514, | |||
20120173642, | |||
20120315932, | |||
20120324568, | |||
20130080543, | |||
20130097248, | |||
20130173727, | |||
20130194301, | |||
20130218986, | |||
20140032682, | |||
20140086235, | |||
20140089416, | |||
20140095631, | |||
20140173755, | |||
20140194151, | |||
20140235204, | |||
20140280534, | |||
20150207769, | |||
20150326510, | |||
20160164816, | |||
20160165040, | |||
20160191437, | |||
20160191444, | |||
20160191453, | |||
20170134322, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Date | Maintenance Fee Events |
Date | Maintenance Schedule |
Apr 12 2025 | 4 years fee payment window open |
Oct 12 2025 | 6 months grace period start (w surcharge) |
Apr 12 2026 | patent expiry (for year 4) |
Apr 12 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 12 2029 | 8 years fee payment window open |
Oct 12 2029 | 6 months grace period start (w surcharge) |
Apr 12 2030 | patent expiry (for year 8) |
Apr 12 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 12 2033 | 12 years fee payment window open |
Oct 12 2033 | 6 months grace period start (w surcharge) |
Apr 12 2034 | patent expiry (for year 12) |
Apr 12 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |